Lexis's repositories
Azure-Exploitation
Audit and pentest methodologies including enumeration, privesc, lateral movement, etc.
Database-Exploitation
Pentest tips on database
000
External-Enumeration
External enumeration methodology for external pentest
000
File-Transfert-Methods
Common file transfert methods
Linux-Exploitation
Audit and pentest methodologies for Linux including internal enumeration, privesc, lateral movement, etc.
000
Web-Exploitation
Tips and methodologies to pentest the most common web services
000
Windows-Exploitation
Audit and pentest methodologies for Windows including internal enumeration, privesc, lateral movement, etc.
000